• Web3 developer Brian Guan lost $40,000 after accidentally posting his wallet’s secret keys publicly on GitHub, with the funds being drained in just two minutes.
  • The crypto community’s reactions were mixed, with some offering support and others mocking Guan’s previous comments about developers using AI tools like ChatGPT for coding.
  • This incident highlights ongoing debates about security practices and the role of AI in software development within the crypto community.
  • @lurch
    link
    English
    10
    edit-2
    18 days ago

    the format of the encrypted file can give the attackers an advantage. if your code reads the decrypted file, the attacker can guess the first line is a comment or the name of a setting. a savvy person can combine that with the algorithm to perform a “known plaintext attack”, for example by generating a number of possible passwords that would lead to files starting like that.

    • @[email protected]
      link
      fedilink
      English
      518 days ago

      That’s smart. Anyone trying that should definitely have a machine-generated strong password!

    • @[email protected]
      link
      fedilink
      English
      417 days ago

      That’s not quite the definition of known plaintext attack (cryptography nerd here), that’s bruteforce with a “crib” to use older terminology (known patterns which allows you to test candidate keys).

      A known plaintext attack is defined as an attack on the algorithm to extract the key faster than bruteforce with analytical attacks.